Statements (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Access Control System
|
gptkbp:appliesTo |
information security
access control systems |
gptkbp:category |
access control
role-based access control computer security standard |
gptkbp:defines |
constrained RBAC model
core RBAC model hierarchical RBAC model symmetrical RBAC model |
gptkbp:fullName |
NIST Standard for Role-Based Access Control
|
gptkbp:hasComponent |
roles
users permissions sessions |
gptkbp:hasConcept |
role-based access control
|
gptkbp:hasFeature |
separation of duties
role constraints role hierarchies permission assignment user assignment |
https://www.w3.org/2000/01/rdf-schema#label |
NIST RBAC standard
|
gptkbp:influenced |
enterprise access control policies
software authorization frameworks |
gptkbp:publicationYear |
2004
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:publishedIn |
gptkb:NIST_Special_Publication_800-53
gptkb:NIST_Special_Publication_800-162 |
gptkbp:standardNumber |
NIST INCITS 359-2004
|
gptkbp:bfsParent |
gptkb:Role-based_access_control_(RBAC)
gptkb:core_RBAC |
gptkbp:bfsLayer |
8
|